Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

Tor-ramdisk is an i686 uClibc-based micro Linux distribution whose only purpose is to host a Tor server in an environment that maximizes security and privacy. Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Security is enhanced by employing a monolithically compiled GRSEC/PAX patched kernel and hardened system tools. Privacy is enhanced by turning off logging at all levels so that even the Tor operator only has access to minimal information. Finally, since everything runs in ephemeral memory, no information survives a reboot, except for the Tor configuration file and the private RSA key which may be exported/imported by FTP. x86 version.

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

The Mandos system allows computers to have encrypted root file systems and at the same time be capable of remote or unattended reboots. The computers run a small client program in the initial RAM disk environment which will communicate with a server over a network. All network communication is encrypted using TLS. The clients are identified by the server using an OpenPGP key that is unique to each client. The server sends the clients an encrypted password. The encrypted password is decrypted by the clients using the same OpenPGP key, and the password is then used to unlock the root file system.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020006 (GetObjetsRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020006 (GetObjetsRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020006 (GetObjetsRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020002 (GetFooterRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020004 (GetBootRecordRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020004 (GetBootRecordRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

This Metasploit module exploits a remote buffer overflow in the Citrix Provisioning Services 5.6 SP1 (without Hotfix CPVS56SP1E043) by sending a malformed packet with the opcode 0x40020004 (GetBootRecordRequest) to the 6905/UDP port. The module, which allows code execution under the context of SYSTEM, has been successfully tested on Windows Server 2003 SP2 and Windows XP SP3.

Authors: Marek MöckelTags: spaceEvent: Chaos Communication Camp 2011Abstract: This talk is about different sources of space debris and how they are a problem for current and future space travel. I'll introduce some of the computational models that are used to simulate space debris objects and some ideas to prevent them. The environment around Earth is littered with different types of debris - some of natural origin, some human-made. They already pose a risk to spacecraft which will increase if nothing is done about the problem. I will introduce the different known sources of space debris. The objects' sizes range from several meters to only micrometers so it is impossible to detect most objects. Therefore the space debris environment has to be simulated to estimate current and future collision risks for spacecraft. Since we're talking millions of objects that have to be treated individually, a lot of computational power is required. Preventing space debris is a matter of global concern. Many proposals have been issued about how to achieve this; but especially the active removal of existing space debris objects is an open problem.

[Emre] sent in a cool art piece he’s been working on that visualizes your voice without the use of a microcontroller. The project is called Visible Voice only consists of a laser, mirror, audio speaker and a phosphorescent disk. The laser shines onto a mirror mounted on the speaker and is reflected onto the disk. [...]

So I went through the trouble of install BackTrack 5 on my MacBook with a dual boot. Spent a good 8 hours working out the kinks that are involved in that. After I managed to successfully boot into BackTrack and got the wireless drivers to function I noticed that the screen resolution was stuck at 1024x768. I cannot change that to the native 1200x800 resolution that I was used to in OS X. Is there a somewhat simple way of changing the display resolution?

Theses are the team buzzer boxes which [Philippe Chrétien] built for his mother. She’s a big fan of quiz shows (we’re thinking Jeopardy and the like) and he thought she’d enjoy a proper setup for home gaming. Each unit consists of an arcade button and one LED, both housed in a project box. He uses [...]

Starting your garden indoors helps to ensure large yields. This is because the plants get a head start before it’s warm enough for them to be put in the ground. But the process involves a fair amount of labor, ensuring that the lights are turned on and off at the right times each day, and [...]

I'm on an HP laptop with a Broadcom card inside. Have BackTrack 5 R2 installed to HDD, although I'm not using it since it locks up after a few minutes. While running R1 on a USB stick, it won't recognize the internal wifi at all. "lspci" shows the Broadcom PCI card, but rfkill shows nothing. Hitting the "F12" key which is the wifi key does nothing. Any ideas folks?

You may remember Perler beads from first or second grade; these small plastic beads are placed into a peg board and then ironed to produce a solid multicolored piece of plastic. Recently, Perler beads have seen somewhat of a revival due to a few people creating 8 and 16-bit video game sprites in plastic, but [...]

[Dustin Evans] wanted to used his original NES controllers to play emulated games. The problem is he didn’t want to alter the classic hardware. His solution was to use the connectors and enclosure from a dead NES to build a Bluetooth translator that works with any NES controller. Here he’s showing the gutted half of [...]

[Stephanie] just finished up her wearable project which puts a lot of information where a wristwatch would normally be found. She calls it the Integrated Sensors Electronic Bracer. We had to look up what a bracer is; the name originates with archers and it was a leather wrap used to protect the wrist. This does that, but [...]

[Matt Oppenheim] wrote in to share his work with us. He has been modifying the interfaces of electronics for the visually impaired. It started off with cassette decks. As [Matt] points out, many people who are visually impaired use cassettes for their audio books and newspapers. [Matt] added some touch sensors to the buttons so [...]

As a final project in their 3rd year of the University of Technology Sydney, [James] and a few classmates put together this interesting game. Called BrainTap, it is described as a game targeted at the baby boomers focusing on fine motor skills and memory. The game plays similar to the common game “simon”. The box [...]

Or who they are willing to employ. If you were the NSA, would you
really want to hire someone who supports Wikileaks, considering
everything that has happened? I am willing to bet that a lot of
technically qualified people who would be willing to work for the NSA
are not considered as candidates for non-technical reasons.

TrueCaller – worldwide number search and spam filter, a top iPhone
application in many countries, enables users to search half a billion phone
numbers worldwide and much more.

The application allows users to search numbers if and only if the user
enables *Enhanced Search* feature. When enabled, the user is warned that
his contacts will be shared with other users to search and his address book
is sent to TrueCaller database. This process is...

The picture you see above isn’t a doll house, nocliped video game, or any other artificially created virtual environment. That bathroom exists in real life, but was digitized into a 3D object with a Kinect and Kintinuous, an awesome piece of software that allows for the creation of huge 3D environments in real time. Kintinuous is [...]

If you’ve ever wanted to combine the extreme note-bending capability of a trombone with the obvious awesomeness of a bass guitar, maybe a whamola like this one could be for you! I’d never heard of one until recently, and haven’t picked up my bass in years, but my much more musically inclined cousin and I [...]

ok ive haf backtrack 5 for alittle bit now and im having a major issue, i forgot my password and its not the default toor password, is there any way to reset my backtrack 5 to defaults (sort of like on windows f10 to reset to factory defaults) and if not how can i change/recover it?

If you need to know, i run gnome 64 bit(yes im sure i can run a 64 bit) and i have an HP computer (terrabyte).

Like most people out there, we’re fascinated by these little buzzing and hovering quadrotors. We’ve really enjoyed the recent trend of miniaturizing them and using PCBs as the frame itself. As [scolton] points out in his instructible, his isn’t the first, the smallest, or the lightest, but he does have some great information and a [...]

This peculiar instrument, called the Dronitar, is completely made from scrap. Interestingly, it sounds pretty good. You can hear the dronitar in action in the video after the break.The call this a ”2 stringed” instrument,and most who are instrumentally savvy will find a bit of confusion here. They are referring to the string that you [...]

Secunia Security Advisory - HP has issued an update for Java in HP-UX. This fixes multiple vulnerabilities, which can be exploited by malicious people to disclose potentially sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.

Secunia Security Advisory - SUSE has issued an update for python. This fixes a weakness and some vulnerabilities, which can be exploited by malicious, local users to potentially disclose sensitive Information and by malicious people to cause a DoS (Denial of Service).

Secunia Security Advisory - Ubuntu has issued an update for linux. This fixes two vulnerabilities, which can be exploited by malicious, local users in a guest virtual machine and by malicious people to cause a DoS (Denial of Service).